Home    >   Information   >   information security   >   give an example in which hiding information does not add appreciably to the security of a system?

give an example in which hiding information does not add appreciably to the security of a system?

I can answer. Hide the implementation of the UNIX password hashing algorithm, for example, is one example of when hiding information doesn’t add significantly to security of a system. By extracting the source code from the relevant library routine, we are able to determine the algorithm.

give an example in which hiding information does not add appreciably to the security of a system - Related Questions

What is an example of the phrase security through obscurity?

Security by obscurity could be employed, for example, in a house that has an expensive lock system, but you are just supposed to tug on the handle to open the lock. Then it is somewhat secure if you don't know about it, but once you read it, it becomes trivial to get around.

Why is security through obscurity a bad idea for the overall security of a system?

Often, security through obscurity is seen as a bad security strategy because the obscurity is often used as the primary means of protecting information. When someone discovers the particular obscurity you use, you are vulnerable again because they don't know what it is.

What is confidentiality in IT security?

Cybersecurity is built on a foundation of confidentiality. Secret information is protected by confidentiality, which means it cannot be disclosed without authorization. In many of these controls, authorized users are only allowed to view information, preventing breaches from occurring in the first place.

Does security by obscurity offer any security benefits?

A combination of obscurity and other security mechanisms is a good way of maintaining security. Once you find out the secrets behind STO, it's all over if you rely solely on it. To summarize, STO is not bad, only the practitioners are bad.

What is meant by security through obscurity?

It is possible (or even desirable) for systems or components to be secure through the use of design or implementation secrecy.

What does security through obscurity is not an answer means?

In other words, obscurity is the majority of security mechanisms. It would suffice to hide details about the mechanisms to secure the system. By obscuring security, we develop a false sense of security, which is more dangerous than ignoring it altogether.

Is security by obscurity bad?

There is no consensus in standards bodies on the value of security by obscurity alone. In the United States, the National Institute of Standards and Technology (NIST) occasionally warns against this practice: "System security should not be determined by the confidentiality of the implementation or the components.".

Which security principle that contradicts the idea of security through obscurity?

all, I would like to ask you about the principle of cryptography that conflicts with the idea of security through obscurity. An introduction to cryptography will be helpful. Cryptography refers to a methodology of safeguarding communications with third parties.

What is security through obscurity concept?

In security through obscurity, the privacy and confidentiality of design architecture are enforced so that a system is secure without revealing the internal components of that system. In obscurity security, security flaws are deliberately hidden or concealed in a system in order to make it more secure.

What is meant by the phrase security through obscurity and why is this concept not accurate?

The phrase "security through obscurity" doesn't accurately describe what security means. Having security through obscurity means that a system can be made secure if outsiders have no knowledge of its inner workings or how it is secure. Keeping secrets from people is an impossible task because no one can know everything.

What are the 3 principles of information security?

CIA triad is composed of confidentiality, integrity, and availability, which comprise an information security model.

What is confidentiality in information security with example?

A confidential record is one that cannot be accessed by anyone unauthorized. It is possible to maintain the confidentiality of a computer file if authorized users are able to access it while unauthorized parties are not permitted to do so.

What is difference between confidentiality and security?

It is the application of logical, technical, administrative, and physical safeguards to ensure the integrity of data, confidentiality of data, and availability of data. The concept of confidentiality is that non-public information is not accessible to unauthorized users after it was restricted by two or more parties.

Why is security by obscurity bad?

A secure system is compromised by security through obscurity because the system becomes insecure when it substitutes secrecy for security, so that when someone learns the trick, the system becomes vulnerable. If I add obscure credentials to my actual security, this will reduce the chances that I will be attacked. A good example would be camouflage and OPSEC.

What is meant by security by obscurity?

Keeping secrets about an element of a security strategy can increase its security; for example, setting up a cryptographic system so that its algorithms are hidden or maintaining a password. The problem with security by obscurity is that it can often be defeated easily, creating the illusion security by obscurity efforts can be easily defeated and may provide a misleading sense of security.